CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In June 2018

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
551 CVE-2018-11148 78 2018-06-02 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 6 of 46).
552 CVE-2018-11147 78 2018-06-02 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 5 of 46).
553 CVE-2018-11146 78 2018-06-02 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 4 of 46).
554 CVE-2018-11145 78 2018-06-02 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 3 of 46).
555 CVE-2018-11144 78 2018-06-02 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 2 of 46).
556 CVE-2018-11143 78 2018-06-02 2019-10-03
7.5
None Remote Low Not required Partial Partial Partial
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 1 of 46).
557 CVE-2018-11116 732 Exec Code 2018-06-19 2019-12-20
6.5
None Remote Low ??? Partial Partial Partial
** DISPUTED ** OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that were only supposed to be accessible to a specific user, as demonstrated by the file, log, and service namespaces, potentially leading to remote Information Disclosure or Code Execution. NOTE: The developer disputes this as a vulnerability, indicating that rpcd functions appropriately.
558 CVE-2018-11053 732 2018-06-26 2021-06-10
4.0
None Remote Low ??? None Partial None
Dell EMC iDRAC Service Module for all supported Linux and XenServer versions v3.0.1, v3.0.2, v3.1.0, v3.2.0, when started, changes the default file permission of the hosts file of the host operating system (/etc/hosts) to world writable. A malicious low privileged operating system user or process could modify the host file and potentially redirect traffic from the intended destination to sites hosting malicious or unwanted content.
559 CVE-2018-11046 20 2018-06-25 2018-08-30
4.0
None Remote Low ??? None Partial None
Pivotal Operations Manager, versions 2.1.x prior to 2.1.6 and version 2.0.14, includes NGINX packages that lacks security vulnerability patches. An attacker with access to the NGINX processes and knowledge of how to exploit the unpatched vulnerabilities may be able to impact Operations Manager
560 CVE-2018-11041 601 2018-06-25 2018-08-23
5.8
None Remote Medium Not required Partial Partial None
Cloud Foundry UAA, versions later than 4.6.0 and prior to 4.19.0 except 4.10.1 and 4.7.5 and uaa-release versions later than v48 and prior to v60 except v55.1 and v52.9, does not validate redirect URL values on a form parameter used for internal UAA redirects on the login page, allowing open redirects. A remote attacker can craft a malicious link that, when clicked, will redirect users to arbitrary websites after a successful login attempt.
561 CVE-2018-11040 829 2018-06-25 2021-10-20
4.3
None Remote Medium Not required Partial None None
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests.
562 CVE-2018-11039 XSS 2018-06-25 2021-10-20
4.3
None Remote Medium Not required Partial None None
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.
563 CVE-2018-10997 89 Sql 2018-06-17 2018-08-14
10.0
None Remote Low Not required Complete Complete Complete
Etere EtereWeb before 28.1.20 has a pre-authentication blind SQL injection in the POST parameters txUserName and txPassword.
564 CVE-2018-10969 89 Exec Code Sql 2018-06-17 2018-08-14
7.5
None Remote Low Not required Partial Partial Partial
SQL injection vulnerability in the Pie Register plugin before 3.0.10 for WordPress allows remote attackers to execute arbitrary SQL commands via the invitation codes grid.
565 CVE-2018-10966 798 2018-06-05 2018-07-20
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in GamerPolls 0.4.6, related to config/environments/all.js and config/initializers/02_passport.js. An attacker can edit the Passport.js contents of the session cookie to contain the ID number of the account they wish to take over, and re-sign it using the hard coded secret.
566 CVE-2018-10956 22 Dir. Trav. 2018-06-25 2018-08-27
5.0
None Remote Low Not required Partial None None
IPConfigure Orchid Core VMS 2.0.5 allows Directory Traversal.
567 CVE-2018-10945 125 DoS 2018-06-19 2018-08-10
5.0
None Remote Low Not required None None Partial
The mg_handle_cgi function in mongoose.c in Mongoose 6.11 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash, or NULL pointer dereference) via an HTTP request, related to the mbuf_insert function.
568 CVE-2018-10860 22 Dir. Trav. 2018-06-29 2018-09-23
6.4
None Remote Low Not required None Partial Partial
perl-archive-zip is vulnerable to a directory traversal in Archive::Zip. It was found that the Archive::Zip module did not properly sanitize paths while extracting zip files. An attacker able to provide a specially crafted archive for processing could use this flaw to write or overwrite arbitrary files in the context of the perl interpreter.
569 CVE-2018-10852 200 +Info 2018-06-26 2019-10-09
5.0
None Remote Low Not required Partial None None
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
570 CVE-2018-10850 362 DoS 2018-06-13 2019-05-15
7.1
None Remote Medium Not required None None Complete
389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.
571 CVE-2018-10841 288 2018-06-20 2021-12-15
6.5
None Remote Low ??? Partial Partial Partial
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
572 CVE-2018-10821 79 XSS 2018-06-14 2020-06-04
3.5
None Remote Medium ??? None Partial None
Cross-site scripting (XSS) vulnerability in backend/pages/modify.php in BlackCatCMS 1.3 allows remote authenticated users with the Admin role to inject arbitrary web script or HTML via the search panel.
573 CVE-2018-10813 798 2018-06-05 2018-07-20
7.5
None Remote Low Not required Partial Partial Partial
In Dedos-web 1.0, the cookie and session secrets used in the Express.js application have hardcoded values that are visible in the source code published on GitHub. An attacker can edit the contents of the session cookie and re-sign it using the hardcoded secret. Due to the use of Passport.js, this could lead to privilege escalation.
574 CVE-2018-10811 909 DoS 2018-06-19 2021-05-18
5.0
None Remote Low Not required None None Partial
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
575 CVE-2018-10664 119 Overflow Mem. Corr. 2018-06-26 2018-08-20
5.0
None Remote Low Not required None None Partial
An issue was discovered in the httpd process in multiple models of Axis IP Cameras. There is Memory Corruption.
576 CVE-2018-10663 200 +Info 2018-06-26 2018-08-20
5.0
None Remote Low Not required Partial None None
An issue was discovered in multiple models of Axis IP Cameras. There is an Incorrect Size Calculation.
577 CVE-2018-10662 2018-06-26 2019-10-03
10.0
None Remote Low Not required Complete Complete Complete
An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface.
578 CVE-2018-10661 Bypass 2018-06-26 2019-10-03
10.0
None Remote Low Not required Complete Complete Complete
An issue was discovered in multiple models of Axis IP Cameras. There is a bypass of access control.
579 CVE-2018-10660 78 2018-06-26 2019-10-03
10.0
None Remote Low Not required Complete Complete Complete
An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection.
580 CVE-2018-10659 119 DoS Overflow Mem. Corr. 2018-06-26 2018-08-20
5.0
None Remote Low Not required None None Partial
There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which allows remote attackers to cause a denial of service (crash) by sending a crafted command which will result in a code path that calls the UND undefined ARM instruction.
581 CVE-2018-10658 119 DoS Overflow Mem. Corr. 2018-06-26 2018-08-20
5.0
None Remote Low Not required None None Partial
There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which causes a denial of service (crash). The crash arises from code inside libdbus-send.so shared object or similar.
582 CVE-2018-10623 125 Exec Code 2018-06-18 2019-10-09
7.5
None Remote Low Not required Partial Partial Partial
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior performs read operations on a memory buffer where the position can be determined by a value read from a .dpa file. This may cause improper restriction of operations within the bounds of the memory buffer, allow remote code execution, alter the intended control flow, allow reading of sensitive information, or cause the application to crash.
583 CVE-2018-10621 119 Exec Code Overflow 2018-06-18 2019-10-09
7.5
None Remote Low Not required Partial Partial Partial
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length stack buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application to crash.
584 CVE-2018-10619 428 Exec Code 2018-06-07 2019-10-09
4.6
None Local Low Not required Partial Partial Partial
An unquoted search path or element in RSLinx Classic Versions 3.90.01 and prior and FactoryTalk Linx Gateway Versions 3.90.00 and prior may allow an authorized, but non-privileged local user to execute arbitrary code and allow a threat actor to escalate user privileges on the affected workstation.
585 CVE-2018-10617 119 Exec Code Overflow 2018-06-18 2019-10-09
7.5
None Remote Low Not required Partial Partial Partial
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length heap buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application to crash.
586 CVE-2018-10615 22 Dir. Trav. 2018-06-04 2019-10-09
6.5
None Remote Low ??? Partial Partial Partial
Directory traversal may lead to files being exfiltrated or deleted on the GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior host platform.
587 CVE-2018-10613 611 2018-06-04 2019-10-09
5.0
None Remote Low Not required Partial None None
Multiple variants of XML External Entity (XXE) attacks may be used to exfiltrate data from the host Windows platform in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior.
588 CVE-2018-10611 287 Exec Code 2018-06-04 2019-10-09
7.5
None Remote Low Not required Partial Partial Partial
Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services.
589 CVE-2018-10601 787 Overflow 2018-06-05 2021-05-10
5.4
None Local Network Medium Not required Partial Partial Partial
IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that exposes an "echo" service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.
590 CVE-2018-10599 200 +Info 2018-06-05 2021-05-10
2.9
None Local Network Medium Not required Partial None None
IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that allows an unauthenticated attacker to read memory from an attacker-chosen device address within the same subnet.
591 CVE-2018-10597 787 2018-06-05 2021-05-10
5.4
None Local Network Medium Not required Partial Partial Partial
IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that allows an unauthenticated attacker to access memory ("write-what-where") from an attacker-chosen device address within the same subnet.
592 CVE-2018-10594 119 Exec Code Overflow 2018-06-26 2019-10-09
7.5
None Remote Low Not required Partial Partial Partial
Delta Industrial Automation COMMGR from Delta Electronics versions 1.08 and prior with accompanying PLC Simulators (DVPSimulator EH2, EH3, ES2, SE, SS2 and AHSIM_5x0, AHSIM_5x1) utilize a fixed-length stack buffer where an unverified length value can be read from the network packets via a specific network port, causing the buffer to be overwritten. This may allow remote code execution, cause the application to crash, or result in a denial-of-service condition in the application server.
593 CVE-2018-10509 2018-06-12 2019-10-03
4.0
None Remote Low ??? Partial None None
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to exploit it via a Browser Refresh attack on vulnerable installations. An attacker must be using a AD logon user account in order to exploit this vulnerability.
594 CVE-2018-10508 2018-06-12 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to use a specially crafted URL to elevate account permissions on vulnerable installations. An attacker must already have at least guest privileges in order to exploit this vulnerability.
595 CVE-2018-10507 Bypass 2018-06-12 2019-10-03
2.1
None Local Low Not required None Partial None
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to take a series of steps to bypass or render the OfficeScan Unauthorized Change Prevention inoperable on vulnerable installations. An attacker must already have administrator privileges in order to exploit this vulnerability.
596 CVE-2018-10506 125 Exec Code +Info 2018-06-08 2018-07-27
1.9
None Local Medium Not required Partial None None
A out-of-bounds read information disclosure vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local attacker to disclose sensitive information on vulnerable installations due to a flaw within the processing of IOCTL 0x220004 by the TMWFP driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
597 CVE-2018-10505 119 Exec Code Overflow 2018-06-08 2019-10-03
5.4
None Local Medium Not required None Partial Complete
A pool corruption privilege escalation vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within the processing of IOCTL 0x220008 in the TMWFP driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
598 CVE-2018-10470 347 2018-06-12 2021-09-08
5.0
None Remote Low Not required None Partial None
Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid.
599 CVE-2018-10408 295 Exec Code 2018-06-13 2019-10-03
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in VirusTotal. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
600 CVE-2018-10407 347 Exec Code 2018-06-13 2018-08-10
4.3
None Remote Medium Not required None Partial None
An issue was discovered in Carbon Black Cb Response. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
Total number of vulnerabilities : 1788   Page : 1 2 3 4 5 6 7 8 9 10 11 12 (This Page)13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.